General

  • Target

    96a1b0b916cdc2d97067066697b30b70848666676cf77489d82299981229bc97

  • Size

    5.3MB

  • Sample

    240703-jaez7ssgpf

  • MD5

    c51a0b6c89c4df20879e4edb9cfe70a0

  • SHA1

    c7b190b8927696ede122b79ba5d40c1a6b7d4c86

  • SHA256

    96a1b0b916cdc2d97067066697b30b70848666676cf77489d82299981229bc97

  • SHA512

    cf39ba14c049fc995869caa8ed1a1c9dc3e43df95575fe6674a488e6b6e99229d1a9e41f3f19535ec33079ccf9b8f20068249b002d220853e7f946e218ab4485

  • SSDEEP

    98304:CjlIKXI034vFbICXxFKwtarhPKpc70UQvFJ4gos0QzkKaid3Kp4mBKOdQxDa:EIg4vRXxFKKMhSEGJ4zs/zPA7BKIQpa

Malware Config

Targets

    • Target

      96a1b0b916cdc2d97067066697b30b70848666676cf77489d82299981229bc97

    • Size

      5.3MB

    • MD5

      c51a0b6c89c4df20879e4edb9cfe70a0

    • SHA1

      c7b190b8927696ede122b79ba5d40c1a6b7d4c86

    • SHA256

      96a1b0b916cdc2d97067066697b30b70848666676cf77489d82299981229bc97

    • SHA512

      cf39ba14c049fc995869caa8ed1a1c9dc3e43df95575fe6674a488e6b6e99229d1a9e41f3f19535ec33079ccf9b8f20068249b002d220853e7f946e218ab4485

    • SSDEEP

      98304:CjlIKXI034vFbICXxFKwtarhPKpc70UQvFJ4gos0QzkKaid3Kp4mBKOdQxDa:EIg4vRXxFKKMhSEGJ4zs/zPA7BKIQpa

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks